Difference between revisions of "Team:NEFU China/Gold integrated"

 
(68 intermediate revisions by 6 users not shown)
Line 6: Line 6:
  
 
<title>Human Practices</title>
 
<title>Human Practices</title>
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-members-foot&action=raw&ctype=text/css"  rel="stylesheet" type="text/css">
 
 
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-menu&action=raw&ctype=text/css"  rel="stylesheet" type="text/css">
 
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-menu&action=raw&ctype=text/css"  rel="stylesheet" type="text/css">
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-style-Silver&action=raw&ctype=text/css"  rel="stylesheet" type="text/css">
+
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-style-Gold&action=raw&ctype=text/css"  rel="stylesheet" type="text/css">
 
<style>
 
<style>
+
table {
 +
    border: 0px!important;
 +
}
 +
td {
 +
border: 0px!important;
 +
}
 +
.humanpractice-block span{
 +
float:left!important;
 +
}
 
#top_title, #sideMenu{
 
#top_title, #sideMenu{
 
     display: none;
 
     display: none;
Line 23: Line 30:
 
#foot-title h3 {
 
#foot-title h3 {
 
font-size:18px!important;
 
font-size:18px!important;
 +
}
 +
#menu li ul li:hover ul{
 +
    background:rgba(0,0,0,0.75)!important;
 +
}
 +
li#mainlevel_01 a {
 +
    color: #FFE5B5!important;
 +
 +
}
 +
li#mainlevel_01 a:hover {
 +
    font-size:30px!important;
 +
    text-shadow:0px 0px 8px #FFE5B5,
 +
                0px 0px 42px #FFE5B5,
 +
                0px 0px 72px #FFE5B5,
 +
                0px 0px 150px #FFE5B5;
 +
}
 +
li#mainlevel_02 a {
 +
    color: #FFE5B5!important;
 +
}
 +
li#mainlevel_02 a:hover {
 +
    font-size:30px!important;
 +
    text-shadow:0px 0px 8px #FFE5B5,
 +
                0px 0px 42px #FFE5B5,
 +
                0px 0px 72px #FFE5B5,
 +
                0px 0px 150px #FFE5B5;
 +
}
 +
li#mainlevel_03 a {
 +
    color: #FFE5B5!important;
 +
}
 +
li#mainlevel_03 a:hover {
 +
    font-size:30px!important;
 +
    text-shadow:0px 0px 8px #FFE5B5,
 +
                0px 0px 42px #FFE5B5,
 +
                0px 0px 72px #FFE5B5,
 +
                0px 0px 150px #FFE5B5;
 +
}
 +
li#mainlevel_05 a {
 +
    color: #FFE5B5!important;
 +
}
 +
li#mainlevel_05 a:hover {
 +
    font-size:30px!important;
 +
    text-shadow:0px 0px 8px #FFE5B5,
 +
                0px 0px 42px #FFE5B5,
 +
                0px 0px 72px #FFE5B5,
 +
                0px 0px 150px #FFE5B5;
 +
}
 +
li#mainlevel_06 a {
 +
    color: #FFE5B5!important;
 +
}
 +
li#mainlevel_06 a:hover {
 +
    font-size:30px!important;
 +
    text-shadow:0px 0px 8px #FFE5B5,
 +
                0px 0px 42px #FFE5B5,
 +
                0px 0px 72px #FFE5B5,
 +
                0px 0px 150px #FFE5B5;
 +
}
 +
li#mainlevel_07 a {
 +
    color: #FFE5B5!important;
 +
}
 +
li#mainlevel_07 a:hover {
 +
    font-size:30px!important;
 +
    text-shadow:0px 0px 8px #FFE5B5,
 +
                0px 0px 42px #FFE5B5,
 +
                0px 0px 72px #FFE5B5,
 +
                0px 0px 150px #FFE5B5;
 +
}
 +
li#mainlevel_08 a {
 +
    color: #FFE5B5!important;
 +
}
 +
li#mainlevel_08 a:hover {
 +
    font-size:30px!important;
 +
    text-shadow:0px 0px 8px #FFE5B5,
 +
                0px 0px 42px #FFE5B5,
 +
                0px 0px 72px #FFE5B5,
 +
                0px 0px 150px #FFE5B5;
 +
}
 +
#menu li ul li ul li a:hover {
 +
    color: rgba(0,223,252,1);
 +
    border-top: dotted 1px rgba(255,255,255,0.91);
 +
    border-bottom: dotted 1px rgba(255,255,255,0.91);
 +
    background: rgba(0,223,252,.02);
 +
}
 +
#nav .mainlevel a {
 +
    color: black;
 +
    text-decoration:none;
 +
    line-height:32px;
 +
    display:block;
 +
    padding:0 5px;
 +
    font-size: 25px!important;
 +
font-family: 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji' !important;
 +
}
 +
.layer-bottom {
 +
z-index: -2;
 +
position: absolute;
 +
margin-top: 0px!important;
 +
}
 +
#foot-title h3{
 +
font-size: 18px!important;
 +
}
 +
#table1,#table2,#table3,#table4,#table5,#table6,#table7 {background-color: transparent!important;}
 +
 +
#table1 tr {
 +
    background-color: transparent!important;
 +
}
 +
 +
#table1 td {
 +
    vertical-align: top;
 +
}
 +
#table2 td {
 +
    vertical-align: top;
 +
}
 +
#table3 td {
 +
    vertical-align: top;
 +
}
 +
#table4 td {
 +
    vertical-align: top;
 +
}
 +
#table5 td {
 +
    vertical-align: top;
 +
}
 +
#table6 td {
 +
    vertical-align: top;
 +
}
 +
#table7 td {
 +
    vertical-align: top;
 
}
 
}
 
</style>
 
</style>
Line 29: Line 160:
 
<body>
 
<body>
 
<!--menu-->
 
<!--menu-->
<div id="menu">
+
 
<li id="nav">&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;
+
<div id="menu" style="background-color:rgba(0,0,0,0.6)!important">
<a class="menu1" href="#" style="text-align: right;">☰</a>
+
<li id="nav" style="left: 8%!important; width: 100%!important;">&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;
 +
 
<ul class="firstmenu" style="float: left">
 
<ul class="firstmenu" style="float: left">
 
 
Line 42: Line 174:
 
<ul id="sub_02">
 
<ul id="sub_02">
 
<li><a href="https://2018.igem.org/Team:NEFU_China/Background" target="_self">BACKGROUND</a></li>
 
<li><a href="https://2018.igem.org/Team:NEFU_China/Background" target="_self">BACKGROUND</a></li>
<li><a href="https://2018.igem.org/Team:NEFU_China/Description" target="_self">DESCRIPTION</a></li>
+
<li><a href="https://2018.igem.org/Team:NEFU_China/Description" target="_self">DESCRIPTION &amp; DESIGN</a></li>
<li><a href="https://2018.igem.org/Team:NEFU_China/Design" target="_self">DESIGN</a></li>
+
<li><a href="https://2018.igem.org/Team:NEFU_China/Coding book" target="_self">CODE BOOK</a></li>
<li><a href="https://2018.igem.org/Team:NEFU_China/Coding book" target="_self">CODING BOOK</a></li>
+
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
  <li class="mainlevel" id="mainlevel_03">
+
<li class="mainlevel" id="mainlevel_03">
  <a href="https://2018.igem.org/Team:NEFU_China/Basic_Part"><img id="parts" src="https://static.igem.org/mediawiki/2018/5/58/T--NEFU_China--_PARTS.png">PARTS</a>
+
  <a href="https://2018.igem.org/Team:NEFU_China/Demonstrate"><img id="parts" src="https://static.igem.org/mediawiki/2018/6/62/T--NEFU_China--_RESULTS.png">EXPERIMENTS</a>
 
  <ul id="sub_03">
 
  <ul id="sub_03">
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Lock_Key" target="_self">LOCK &amp; KEY</a></li>
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Suicide" target="_self">INFORMATION DESTRUCTION</a></li>
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Splicing" target="_self">Pre-RNA SPLICING</a></li>
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Demonstrate" target="_self">DEMONSTRATE</a></li>
 +
  <hr>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Basic_Part" target="_self">BASIC PARTS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Basic_Part" target="_self">BASIC PARTS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Composite_Part" target="_self">COMPOSITE PARTS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Composite_Part" target="_self">COMPOSITE PARTS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Improve" target="_self">IMPROVEMENT PARTS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Improve" target="_self">IMPROVEMENT PARTS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Part_Collection" target="_self">PARTS COLLECTION</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Part_Collection" target="_self">PARTS COLLECTION</a></li>
 +
  <hr>
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Notebook" target="_self">NOTEBOOK</a></li>
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Protocol" target="_self">PROTOCOL</a></li>
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
      <li class="mainlevel" id="mainlevel_04">
+
   
  <a href="https://2018.igem.org/Team:NEFU_China/Lock_Key"><img id="results" src="https://static.igem.org/mediawiki/2018/6/62/T--NEFU_China--_RESULTS.png">RESULTS</a>
+
  <ul id="sub_04">
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Lock_Key" target="_self">LOCK &amp; KEY</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Suicide" target="_self">SUICIDE</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Splicing" target="_self">SPLICING</a></li>
+
  </ul>
+
  </li>
+
 
  <li class="mainlevel" id="mainlevel_05">
 
  <li class="mainlevel" id="mainlevel_05">
 
  <a href="https://2018.igem.org/Team:NEFU_China/Model"><img id="model" src="https://static.igem.org/mediawiki/2018/0/0c/T--NEFU_China--_MODEL.png">MODEL</a>
 
  <a href="https://2018.igem.org/Team:NEFU_China/Model"><img id="model" src="https://static.igem.org/mediawiki/2018/0/0c/T--NEFU_China--_MODEL.png">MODEL</a>
 
  <ul id="sub_05">
 
  <ul id="sub_05">
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model" target="_self">OVERVIEW</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model" target="_self">OVERVIEW</a></li>
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model1" target="_self">MODEL1</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model1" target="_self">CORRESPONDING COEFFICIENT</a></li>
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model2" target="_self">MODEL2</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model2" target="_self">KILLING MODEL</a></li>
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
Line 76: Line 208:
 
  <ul id="sub_06">
 
  <ul id="sub_06">
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Software" target="_self">OVERVIEW</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Software" target="_self">OVERVIEW</a></li>
  <li><a href="https://2018.igem.org/Team:NEFU_China/Software1" target="_self">SOFTWARE1</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Software1" target="_self">CODING</a></li>
  <li><a href="https://2018.igem.org/Team:NEFU_China/Software2" target="_self">SOFTWARE2</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Software2" target="_self">MISLEADING</a></li>
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Software3" target="_self">WORDSEGMENT</a></li>
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
Line 85: Line 218:
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Attributions" target="_self">ATTRIBUTIONS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Attributions" target="_self">ATTRIBUTIONS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Members" target="_self">MEMBERS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Members" target="_self">MEMBERS</a></li>
  <li><a href="https://2018.igem.org/Team:NEFU_China/Sponsoring" target="_self">SPONSORING</a></li>
 
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
Line 91: Line 223:
 
  <a href="https://2018.igem.org/Team:NEFU_China/Human_Practices"><img id="humanpractice" src="https://static.igem.org/mediawiki/2018/9/91/T--NEFU_China--_HUMANPRACTICE.png">HUMAN PRACTICE</a>
 
  <a href="https://2018.igem.org/Team:NEFU_China/Human_Practices"><img id="humanpractice" src="https://static.igem.org/mediawiki/2018/9/91/T--NEFU_China--_HUMANPRACTICE.png">HUMAN PRACTICE</a>
 
  <ul id="sub_08">
 
  <ul id="sub_08">
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Human_Practices" target="_self">OVERVIEW</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Gold_integrated" target="_self">GOLD INTEGRATED</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Gold_integrated" target="_self">GOLD INTEGRATED</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Silver" target="_self">SILVER</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Silver" target="_self">SILVER</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Collaborations" target="_self">COLLABORTION</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Collaborations" target="_self">COLLABORTION</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Public_Engagement" target="_self">EDUCATION &amp; PUBLIC ENGAGEMENT</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Public_Engagement" target="_self">EDUCATION &amp; PUBLIC ENGAGEMENT</a></li>
  </ul>
 
  </li>
 
  <li class="mainlevel" id="mainlevel_09">
 
  <a href="https://2018.igem.org/Team:NEFU_China/Notebook"><img id="notebook" src="https://static.igem.org/mediawiki/2018/c/cb/T--NEFU_China--_NOTEBOOK.png">NOTEBOOK</a>
 
  <ul id="sub_09">
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Notebook" target="_self">OVERVIRW</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Protocol" target="_self">PROTOCOL</a></li>
 
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
Line 108: Line 234:
 
</li>
 
</li>
 
</div>
 
</div>
 +
<div class="layer-bottom">
 +
 +
<canvas id="canvas" style="background:#000000"></canvas>
 +
 +
<script type="text/javascript">
 +
 +
window.onload = function(){
 +
var canvas = document.getElementById("canvas");
 +
var context =canvas.getContext("2d");
 +
var W = window.innerWidth;
 +
                        var H = 4800;
 +
//var H = window.innerHeight*1.5;
 +
canvas.width = W;
 +
canvas.height = H;
 +
var fontSize = 20;
 +
var colunms = Math.floor(W /fontSize);
 +
var drops = [];
 +
for(var i=0;i<colunms;i++){
 +
drops.push(0);
 +
}
 +
 +
 +
var str1 = "ATCG";
 +
                        var str2 = "01";
 +
function draw(){
 +
context.fillStyle = "rgba(0,0,0,0.2)";
 +
context.fillRect(0,0,W,H);
 +
context.font = "700 "+fontSize+"px  微软雅黑";
 +
context.fillStyle = "#003544";
 +
for(var i=0;i<colunms/2;i++){
 +
var index = Math.floor(Math.random() * str1.length);
 +
var x = i*fontSize;
 +
var y = drops[i] *fontSize;
 +
context.fillText(str1[index],x,y);
 +
if(y >= canvas.height){
 +
drops[i] = 0;
 +
}
 +
                                        if(Math.random() > 0.99){
 +
                                                drops[i] = 0;
 +
}
 +
drops[i]++;
 +
}
 +
                                for(var i=colunms/2;i<colunms;i++){
 +
var index = Math.floor(Math.random() * str2.length);
 +
var x = i*fontSize;
 +
var y = drops[i] *fontSize;
 +
context.fillText(str2[index],x,y);
 +
if(y >= canvas.height){
 +
drops[i] = 0;
 +
}
 +
                                        if(Math.random() > 0.99){
 +
                                                drops[i] = 0;
 +
}
 +
drops[i]++;
 +
}
 +
};
 +
 +
function randColor(){
 +
var r = Math.floor(Math.random() * 256);
 +
var g = Math.floor(Math.random() * 256);
 +
var b = Math.floor(Math.random() * 256);
 +
return "rgb("+r+","+g+","+b+")";
 +
}
 +
 +
draw();
 +
setInterval(draw,60);
 +
};
 +
 +
</script>
 +
 +
           
 +
 +
</div>
 
<div id="lead">
 
<div id="lead">
 
     <div id="lead-content">
 
     <div id="lead-content">
         <h1>Gold Medal Criteria</h1>
+
         <h1>Gold integrated</h1>
         <h2>Gold Medal Criteria's introduction.</h2>
+
          
 
     </div>
 
     </div>
 
</div>
 
</div>
Line 123: Line 322:
 
                 <div class="col-md-8">
 
                 <div class="col-md-8">
 
                     <p>
 
                     <p>
                         IT WAS the best of times, it was the worst of times, it was theage of wisdom, it was the age of foolishness, it was the epoch ofbelief, it was the epoch of incredulity, it was the season of Light,it was the season of Darkness, it was the spring of hope, it was thewinter of despair, we had everything before us, we had nothingbefore us, we were all going direct to Heaven, we were all goingdirect the other way- in short, the period was so far like the presentperiod, that some of its noisiest authorities insisted on its beingreceived, for good or for evil, in the superlative degree ofcomparison only.
+
                          
 +
For this part, we thoroughly considered the application of our project in the actual situation, and discussed these issues with our teachers and experts with different professional expertise in biological companies. Here are our conclusions.<br>
 
                     </p>
 
                     </p>
 
                 </div>
 
                 </div>
Line 131: Line 331:
 
<hr style="text-align: center;margin-left: 150px;margin-right: 150px;">
 
<hr style="text-align: center;margin-left: 150px;margin-right: 150px;">
 
<div class="humanpractice">
 
<div class="humanpractice">
     <h2 class="heading">Human Practices - Gold Medal Criteria</h2>
+
 
     <div id="title1" class="humanpractice-block">
+
     <h2 class="heading">Human Practices - Gold integrated</h2>
         <h3>title:111111111111111</h3>
+
     <div class="humanpractice-block">
 +
         <h3 style="color: orange;font-size: 30px!important;">Suggestion From Professor</h3>
 +
<!--
 
         <span class="humanpractice-date">data: 2018.10.07</span>
 
         <span class="humanpractice-date">data: 2018.10.07</span>
         <h4>place: nefu</h4>
+
         <h4>place: nefu</h4>-->
         <p>
+
         <p style="font-size: 26px!important;">
             IT WAS the best of times, it was the worst of times, it was theage of wisdom, it was the age of foolishness, it was the epoch ofbelief, it was the epoch of incredulity, it was the season of Light,it was the season of Darkness, it was the spring of hope, it was thewinter of despair, we had everything before us, we had nothingbefore us, we were all going direct to Heaven, we were all goingdirect the other way- in short, the period was so far like the presentperiod, that some of its noisiest authorities insisted on its beingreceived, for good or for evil, in the superlative degree ofcomparison only.
+
<br>
         </p>
+
             1. We discussed with Professor Yuhua Li, when we wanted to choose a chemical agent to induce the expression of Bax (BCL2 Associated X, Apoptosis Regulator) gene, Professor Li suggested that we could use the α-factor to induce the pFig2c promoter to initiate the expression of Bax suicide gene. In this case, α-type yeast can naturally produce α-factor, which can be recognized by a-type yeast to induce the pFig2c promoter.<br>
 +
            2. When we discussed these questions with Professor Chunbo Teng, she suggested that we can use introns that can be spliced out during mRNA maturation to further encrypt our information.
 +
            </p><br>
 +
<div align="center">
 +
<img src="https://static.igem.org/mediawiki/2018/5/5f/T--NEFU_China--professor_Teng.png" style="width:630px;">
 +
</div>
 +
         <br>
 +
        <p></p>
 
     </div>
 
     </div>
     <div id="title2" class="humanpractice-block">
+
     <div class="humanpractice-block">
<h3>title:222222222222222</h3>
+
<h3 style="color: orange;font-size: 35px;height: 33px!important;">Opinion</h3>
 +
  <!--
 
<span class="humanpractice-date">data: 2018.10.07</span>
 
<span class="humanpractice-date">data: 2018.10.07</span>
 
<h4>place: nefu</h4>
 
<h4>place: nefu</h4>
<p>
+
          -->
             IT WAS the best of times, it was the worst of times, it was theage of wisdom, it was the age of foolishness, it was the epoch ofbelief, it was the epoch of incredulity, it was the season of Light,it was the season of Darkness, it was the spring of hope, it was thewinter of despair, we had everything before us, we had nothingbefore us, we were all going direct to Heaven, we were all goingdirect the other way- in short, the period was so far like the presentperiod, that some of its noisiest authorities insisted on its beingreceived, for good or for evil, in the superlative degree ofcomparison only.
+
<p style="font-size: 26px!important;">
 +
<br>
 +
             Because we have taken into account the interception of information during message transmission, spy yeast ( the information carrying yeast, designated as "spy yeast", a-type yeast) can be induced to trigger apoptosis by the α factor of the killer yeast (α-type yeast) in the process of complete cultivation. The limited culturing time of the yeast prior to their death can prevent information from being leaked out. When designated receiver gets the information-carrying yeast and culture it properly, the yeast can successfully survive.  
 +
 
 +
            <br>
 +
 
         </p>
 
         </p>
 
     </div>
 
     </div>
<div id="title3" class="humanpractice-block">
+
<div class="humanpractice-block">
<h3>title:333333333333333</h3>
+
<h3 style="color: orange;font-size: 35px;height: 33px!important;">Applications</h3>
 +
<!--
 
<span class="humanpractice-date">data: 2018.10.07</span>
 
<span class="humanpractice-date">data: 2018.10.07</span>
<h4>place: nefu</h4>
+
<h4>place: nefu</h4>-->
<p>
+
<p style="font-size: 26px!important;">
             IT WAS the best of times, it was the worst of times, it was theage of wisdom, it was the age of foolishness, it was the epoch ofbelief, it was the epoch of incredulity, it was the season of Light,it was the season of Darkness, it was the spring of hope, it was thewinter of despair, we had everything before us, we had nothingbefore us, we were all going direct to Heaven, we were all goingdirect the other way- in short, the period was so far like the presentperiod, that some of its noisiest authorities insisted on its beingreceived, for good or for evil, in the superlative degree ofcomparison only.
+
<br>
 +
             Through communication with experts from the National Secrecy Bureau of Heilongjiang Province in China, we learned that if our system can be used in the encryption industry, we should be as rigorous as possible in our biological principles. We must limit the equipment and personnel access&nbsp;scopes to ensure that the entire encryption process is rigorous enough. For example, the transport of information-carrying yeast powder and the storage of the keys should be the responsibility of different people, and each part should be accessible to a limited number of people.<br>
 
         </p>
 
         </p>
 
     </div>
 
     </div>
<div id="title4" class="humanpractice-block">
+
<div class="humanpractice-block">
<h3>title:444444444444444</h3>
+
<h3 style="color: orange;font-size: 35px;">Outreach</h3>
 +
<!--
 
<span class="humanpractice-date">data: 2018.10.07</span>
 
<span class="humanpractice-date">data: 2018.10.07</span>
<h4>place: nefu</h4>
+
<h4>place: nefu</h4>-->
 +
 +
 +
   
 +
 
<p>
 
<p>
             IT WAS the best of times, it was the worst of times, it was theage of wisdom, it was the age of foolishness, it was the epoch ofbelief, it was the epoch of incredulity, it was the season of Light,it was the season of Darkness, it was the spring of hope, it was thewinter of despair, we had everything before us, we had nothingbefore us, we were all going direct to Heaven, we were all goingdirect the other way- in short, the period was so far like the presentperiod, that some of its noisiest authorities insisted on its beingreceived, for good or for evil, in the superlative degree ofcomparison only.
+
<br>
        </p>
+
<strong><span style="color: orange;font-size: 30px!important;">Player self-report</span></strong><br><br>
 +
             <span style="color:orange;font-size: 26px;">Player Feng Yang</span><br>
 +
            <p style="font-size: 26px!important;">
 +
As a student who is not major in biology, synthetic biology is so far for me, but this mini-game opens the door to a new world for me. I never thought that biological knowledge could be applied in information storage and encryptions, this mini-game really helped me learn a lot.
 +
            </p><br>
 +
<span style="color:orange;font-size: 26px;">Player Jian Wang</span><br>
 +
            <p style="font-size: 26px!important;">
 +
I found that if I were a burglar who wanted to get true information without correct primers, I had to go through a lot of trials, which shows that this encryption system has stronger confidentiality than the existing encryption methods.
 +
            </p><br>
 +
<span style="color:orange;font-size: 26px;">Player Si Zhang</span><br>
 +
            <p style="font-size: 26px!important;">
 +
This game is very interesting, and the biological knowledge involved is also refreshing, but I think that if we finally get the sentence that there is blank instead of a string of letters, it may be more convenient for the recipient.
 +
Through the player's self-report, we know that our small game really allows players to learn the biological knowledge of our project, and experience the difficulties of cracking our system. At the same time, their suggestions also let us know the shortcomings of our case. We will use computer programming to improve our password book to achieve the effect of word segmentation.
 +
            </p><br>
 +
            <p style="font-size: 26px!important;">
 +
Through the player's self-report, we know that our small game really allows players to learn the biological knowledge of our project, and experience the difficulties of cracking our system. At the same time, their suggestions also let us know the shortcomings of our case. We will use computer programming to improve our password book to achieve the effect of word segmentation.
 +
            </p><br>
 +
</p>
 +
 
 
     </div>
 
     </div>
<div id="title5" class="humanpractice-block">
+
<div class="humanpractice-block">
<h3>title:555555555555555</h3>
+
<h3 style="color: orange;font-size: 35px;">Social</h3>
 +
<!--
 
<span class="humanpractice-date">data: 2018.10.07</span>
 
<span class="humanpractice-date">data: 2018.10.07</span>
<h4>place: nefu</h4>
+
<h4>place: nefu</h4>-->
<p>
+
<p style="font-size: 26px!important;">
             IT WAS the best of times, it was the worst of times, it was theage of wisdom, it was the age of foolishness, it was the epoch ofbelief, it was the epoch of incredulity, it was the season of Light,it was the season of Darkness, it was the spring of hope, it was thewinter of despair, we had everything before us, we had nothingbefore us, we were all going direct to Heaven, we were all goingdirect the other way- in short, the period was so far like the presentperiod, that some of its noisiest authorities insisted on its beingreceived, for good or for evil, in the superlative degree ofcomparison only.
+
<br>
 +
             Our project is about the storage, encryption and transportation of information, so we decided to interview relevant experts and potential users for their advice to optimize our project.<br>
 
         </p>
 
         </p>
 +
 +
   
 +
<p>
 +
<br>
 +
<strong><span style="color: orange;font-size: 26px;">National Institutions</span></strong><br>
 +
<strong><span style="color: orange;font-size: 26px;">The National Secrecy Bureau of Heilongjiang Province in China</span></strong><br>
 +
</p>
 +
<table id="table4">
 +
        <tbody><tr>
 +
<td valign="top" width="75%">
 +
<p style="font-size: 26px!important; margin-left: -18px!important;">
 +
We got in touch with the National Secrecy Bureau of Heilongjiang Province in China to understand the bottlenecks and challenges encountered by today's information storage encryption systems to optimize our project.<br>
 +
</p>
 +
</td>
 +
<td valign="top" width="25%">
 +
<img src="https://static.igem.org/mediawiki/2018/9/9f/T--NEFU_China--HP01.png" style="width: 100%;">
 +
</td>
 +
</tr>
 +
    </tbody></table><br>
 +
 +
<p>
 +
<strong><span style="color: orange;font-size: 26px;">First of all, we explained the principles and innovations of our case to the experts, and put forward an issue: how can we avoid violent cracking?</span></strong><br><br>
 +
            <span style="color:orange;">Experts’ advice:</span><br><br>
 +
<p style="font-size: 26px!important;">
 +
1. Violent cracking is unavoidable, so worry is unnecessary.<br>
 +
2. Do physical isolation to avoid any possible actions that may divulge secret information in the encryption process.<br>
 +
3. Rights Management. We can authorize the staffs in an organization with different levels of access permissions.
 +
4. Maintain an excellent routine record. We need to record the times and purposes of all usage.<br>
 +
Through the communication with experts, we know that if our system is really going to be used in this field, we not only need to be as rigorous as possible in our biological principles, but also need to limit the equipment and personnel settings to ensure the whole process is rigorous enough.
 +
</p>
 +
</p>
 +
 
 +
   
 
     </div>
 
     </div>
</div>
 
<br>
 
<br>
 
<br>
 
<div class="foot">
 
<div id="foot-title">
 
<table>
 
<tr>
 
<td>
 
<h1>Userfull links</h1>
 
<h2>
 
<a href="https://2018.igem.org/Team:NEFU_China">Home</a>
 
&nbsp;&nbsp;&nbsp;
 
<a href="https://2018.igem.org/Team:NEFU_China/Model">Model</a>
 
                        &nbsp;&nbsp;
 
                        <a href="https://2018.igem.org/Team:NEFU_China/Description">Project</a>
 
&nbsp;&nbsp;
 
<a href="https://2018.igem.org/Team:NEFU_China/Software">Software</a>
 
    &nbsp;&nbsp;
 
    </h2>
 
 
<h2>
 
<a href="https://2018.igem.org/Team:NEFU_China/Basic_Part">Parts</a>
 
&nbsp;&nbsp;&nbsp;&nbsp;
 
<a href="https://2018.igem.org/Team:NEFU_China/Members">Teams</a>
 
&nbsp;
 
<a href="https://2018.igem.org/Team:NEFU_China/Lock_Key">Results</a>
 
&nbsp;
 
<a href="https://2018.igem.org/Team:NEFU_China/Notebook">Notebook</a>
 
                        &nbsp;&nbsp;
 
</h2>
 
 
<h2>
 
<a href="https://2018.igem.org/Team:NEFU_China/Human_Practices">Human &nbsp;Practice</a>
 
</h2>
 
</td>
 
<td style="padding-left: 70px">
 
<h1>Follow us</h1>
 
<img alt="facebook" src="https://static.igem.org/mediawiki/2018/b/b5/T--NEFU_China--facebook.png">
 
&nbsp;&nbsp;&nbsp;
 
        <img alt="twitter" src="https://static.igem.org/mediawiki/2018/3/36/T--NEFU_China--twitter.png">
 
&nbsp;&nbsp;&nbsp;
 
<img alt="wehchat" src="https://static.igem.org/mediawiki/2018/c/ca/T--NEFU_China--wechat.png">
 
        <br>
 
        <img alt="facebook" src="https://static.igem.org/mediawiki/2018/b/b5/T--NEFU_China--facebook.png">
 
&nbsp;&nbsp;&nbsp;
 
        <img alt="twitter" src="https://static.igem.org/mediawiki/2018/3/36/T--NEFU_China--twitter.png">
 
&nbsp;&nbsp;&nbsp;
 
<img alt="wehchat" src="https://static.igem.org/mediawiki/2018/c/ca/T--NEFU_China--wechat.png">
 
 
</td>
 
<td style="padding-left: 70px">
 
<h1>Contact us</h1>
 
<h3>iGEM-NEFU_China2018</h3>
 
<h3>Email: hexinglu@nefu.edu.cn</h3>
 
<h3>No.26 Hexing Road, Xiangfang <br>District, Harbin, Heilongjiang <br>Province 150000</h3>
 
</td>
 
</tr>
 
</table>
 
</div>
 
<div id="foot-declare">
 
<p>
 
 
</p>
 
 
</div>
 
</div>
</div>
 
   
 
 
</body>
 
</body>
  
 
</html>
 
</html>

Latest revision as of 13:01, 9 November 2018

Human Practices

Gold integrated

Overview

For this part, we thoroughly considered the application of our project in the actual situation, and discussed these issues with our teachers and experts with different professional expertise in biological companies. Here are our conclusions.


Human Practices - Gold integrated

Suggestion From Professor


1. We discussed with Professor Yuhua Li, when we wanted to choose a chemical agent to induce the expression of Bax (BCL2 Associated X, Apoptosis Regulator) gene, Professor Li suggested that we could use the α-factor to induce the pFig2c promoter to initiate the expression of Bax suicide gene. In this case, α-type yeast can naturally produce α-factor, which can be recognized by a-type yeast to induce the pFig2c promoter.
2. When we discussed these questions with Professor Chunbo Teng, she suggested that we can use introns that can be spliced out during mRNA maturation to further encrypt our information.



Opinion


Because we have taken into account the interception of information during message transmission, spy yeast ( the information carrying yeast, designated as "spy yeast", a-type yeast) can be induced to trigger apoptosis by the α factor of the killer yeast (α-type yeast) in the process of complete cultivation. The limited culturing time of the yeast prior to their death can prevent information from being leaked out. When designated receiver gets the information-carrying yeast and culture it properly, the yeast can successfully survive.

Applications


Through communication with experts from the National Secrecy Bureau of Heilongjiang Province in China, we learned that if our system can be used in the encryption industry, we should be as rigorous as possible in our biological principles. We must limit the equipment and personnel access scopes to ensure that the entire encryption process is rigorous enough. For example, the transport of information-carrying yeast powder and the storage of the keys should be the responsibility of different people, and each part should be accessible to a limited number of people.

Outreach


Player self-report

Player Feng Yang

As a student who is not major in biology, synthetic biology is so far for me, but this mini-game opens the door to a new world for me. I never thought that biological knowledge could be applied in information storage and encryptions, this mini-game really helped me learn a lot.


Player Jian Wang

I found that if I were a burglar who wanted to get true information without correct primers, I had to go through a lot of trials, which shows that this encryption system has stronger confidentiality than the existing encryption methods.


Player Si Zhang

This game is very interesting, and the biological knowledge involved is also refreshing, but I think that if we finally get the sentence that there is blank instead of a string of letters, it may be more convenient for the recipient. Through the player's self-report, we know that our small game really allows players to learn the biological knowledge of our project, and experience the difficulties of cracking our system. At the same time, their suggestions also let us know the shortcomings of our case. We will use computer programming to improve our password book to achieve the effect of word segmentation.


Through the player's self-report, we know that our small game really allows players to learn the biological knowledge of our project, and experience the difficulties of cracking our system. At the same time, their suggestions also let us know the shortcomings of our case. We will use computer programming to improve our password book to achieve the effect of word segmentation.


Social


Our project is about the storage, encryption and transportation of information, so we decided to interview relevant experts and potential users for their advice to optimize our project.


National Institutions
The National Secrecy Bureau of Heilongjiang Province in China

We got in touch with the National Secrecy Bureau of Heilongjiang Province in China to understand the bottlenecks and challenges encountered by today's information storage encryption systems to optimize our project.


First of all, we explained the principles and innovations of our case to the experts, and put forward an issue: how can we avoid violent cracking?

Experts’ advice:

1. Violent cracking is unavoidable, so worry is unnecessary.
2. Do physical isolation to avoid any possible actions that may divulge secret information in the encryption process.
3. Rights Management. We can authorize the staffs in an organization with different levels of access permissions. 4. Maintain an excellent routine record. We need to record the times and purposes of all usage.
Through the communication with experts, we know that if our system is really going to be used in this field, we not only need to be as rigorous as possible in our biological principles, but also need to limit the equipment and personnel settings to ensure the whole process is rigorous enough.